dxgmm1.sys error

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by GordonPremap, Apr 25, 2011.

  1. GordonPremap

    GordonPremap New Member

    Joined:
    Apr 20, 2011
    Messages:
    4
    Likes Received:
    0
    Hi ,

    I've searched the internet trying to find a fix for my problem with no success.

    I'm getting a bsod while using a precision input device ( deva001 pci card www.deva.co.uk )
    .

    The BSOD tells me IRQ NOT EQUAL OR LESS THAN and tells me it something to do with dxgmms1.sys

    I've checked my motherboard bios is up to date, graphics card drivers are up to date as of last week.

    Here is a collection of my minidumps for the past month hopefully one of them will help someone to get to the bottom of this problem I have.
    http://dl.dropbox.com/u/26772212/Minidump.zip

    Any help, ideas, tips ... anything will be much appreciated as this a work computer and we are loosing productivity.



    Thank you.

    Gordon
     
  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    WinDbg points to DX system driver and to nVidia display driver.

    dxgmms1!VidSchiUpdateContextRunningTimeAtISR

    If you get bsods ONLY while using this device, that's the problem then.


    Update drivers:

    VNC
    vncmirror.sys Fri Mar 14 13:43:05 2008
    RealVNC - Obtaining technical support for VNC® software

    Alladin Hardlock
    AKSCLASS.SYS Mon Apr 18 08:58:03 2005
    hardlock.sys Thu Nov 30 12:12:07 2006
    aksusb.sys Thu Nov 16 10:37:01 2006
    akshasp.sys Thu Nov 16 11:12:04 2006
    aksdf.sys Wed Dec 13 12:09:32 2006
    Aladdin Knowledge Systems: Support




    CRASH DUMPS

    Code:
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\041811-12682-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`03417000 PsLoadedModuleList = 0xfffff800`0365ce90
    Debug session time: Mon Apr 18 03:47:34.364 2011 (UTC - 4:00)
    System Uptime: 0 days 0:27:54.566
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {58, 7, 0, fffff880110084c6}
    
    Unable to load image nvlddmkm.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for nvlddmkm.sys
    *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
    Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiProcessIsrCompletedPacket+46 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000058, memory referenced
    Arg2: 0000000000000007, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff880110084c6, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036c80e8
     0000000000000058 
    
    CURRENT_IRQL:  7
    
    FAULTING_IP: 
    dxgmms1!VidSchiProcessIsrCompletedPacket+46
    fffff880`110084c6 837b5803        cmp     dword ptr [rbx+58h],3
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  ustation.exe
    
    TRAP_FRAME:  fffff8800c282cd0 -- (.trap 0xfffff8800c282cd0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa8009e43910 rbx=0000000000000000 rcx=0000000000000004
    rdx=fffffa8009e43911 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880110084c6 rsp=fffff8800c282e60 rbp=fffffa8009e04410
     r8=0000000000000001  r9=0000000000000000 r10=fffffa8009e04bd0
    r11=fffffa8009e439e0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    dxgmms1!VidSchiProcessIsrCompletedPacket+0x46:
    fffff880`110084c6 837b5803        cmp     dword ptr [rbx+58h],3 ds:00000000`00000058=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003496be9 to fffff80003497640
    
    STACK_TEXT:  
    fffff880`0c282b88 fffff800`03496be9 : 00000000`0000000a 00000000`00000058 00000000`00000007 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0c282b90 fffff800`03495860 : fffff880`00000039 00000000`09d40204 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`0c282cd0 fffff880`110084c6 : fffffa80`09e439c0 fffffa80`09e04410 fffffa80`09e42000 fffffa80`09e42000 : nt!KiPageFault+0x260
    fffff880`0c282e60 fffff880`11008172 : fffffa80`09e42000 00000000`00000000 00000000`00000001 fffff880`0c2831a0 : dxgmms1!VidSchiProcessIsrCompletedPacket+0x46
    fffff880`0c282ef0 fffff880`11007f76 : fffffa80`000084e3 00000000`00000001 fffffa80`09e38000 fffffa80`09bf0000 : dxgmms1!VidSchDdiNotifyInterruptWorker+0x1ea
    fffff880`0c282f40 fffff880`11cf213f : fffffa80`08ab9040 00000000`00000000 00000000`000003d0 00000000`00000000 : dxgmms1!VidSchDdiNotifyInterrupt+0x9e
    fffff880`0c282f70 fffff880`1114797e : fffff880`0c2831a0 fffff880`0c2831a0 00000000`00000000 fffffa80`08cf5000 : dxgkrnl!DxgNotifyInterruptCB+0x83
    fffff880`0c282fa0 fffff880`0c2831a0 : fffff880`0c2831a0 00000000`00000000 fffffa80`08cf5000 fffff880`1114790e : nvlddmkm+0xb597e
    fffff880`0c282fa8 fffff880`0c2831a0 : 00000000`00000000 fffffa80`08cf5000 fffff880`1114790e fffffa80`08cf5000 : 0xfffff880`0c2831a0
    fffff880`0c282fb0 00000000`00000000 : fffffa80`08cf5000 fffff880`1114790e fffffa80`08cf5000 00000000`00000000 : 0xfffff880`0c2831a0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    dxgmms1!VidSchiProcessIsrCompletedPacket+46
    fffff880`110084c6 837b5803        cmp     dword ptr [rbx+58h],3
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  dxgmms1!VidSchiProcessIsrCompletedPacket+46
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dxgmms1
    
    IMAGE_NAME:  dxgmms1.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce799c1
    
    FAILURE_BUCKET_ID:  X64_0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46
    
    BUCKET_ID:  X64_0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\040611-13104-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`03404000 PsLoadedModuleList = 0xfffff800`03649e90
    Debug session time: Wed Apr  6 02:09:42.407 2011 (UTC - 4:00)
    System Uptime: 0 days 0:09:54.983
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {58, 5, 0, fffff880110084c6}
    
    Unable to load image nvlddmkm.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for nvlddmkm.sys
    *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
    Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiProcessIsrCompletedPacket+46 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000058, memory referenced
    Arg2: 0000000000000005, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff880110084c6, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036b50e8
     0000000000000058 
    
    CURRENT_IRQL:  5
    
    FAULTING_IP: 
    dxgmms1!VidSchiProcessIsrCompletedPacket+46
    fffff880`110084c6 837b5803        cmp     dword ptr [rbx+58h],3
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  ustation.exe
    
    TRAP_FRAME:  fffff8800c246b70 -- (.trap 0xfffff8800c246b70)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa8009dcece0 rbx=0000000000000000 rcx=0000000000000009
    rdx=fffffa8009dcece1 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880110084c6 rsp=fffff8800c246d00 rbp=fffffa8009d66410
     r8=0000000000000001  r9=0000000000000000 r10=fffffa8009d66bd0
    r11=fffffa8009dcedb0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    dxgmms1!VidSchiProcessIsrCompletedPacket+0x46:
    fffff880`110084c6 837b5803        cmp     dword ptr [rbx+58h],3 ds:00000000`00000058=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003483be9 to fffff80003484640
    
    STACK_TEXT:  
    fffff880`0c246a28 fffff800`03483be9 : 00000000`0000000a 00000000`00000058 00000000`00000005 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0c246a30 fffff800`03482860 : 00000000`07f80000 fffffa80`00000039 fffff8a0`038c0000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`0c246b70 fffff880`110084c6 : fffffa80`09dced90 fffffa80`09d66410 fffffa80`09dce000 fffffa80`09dce000 : nt!KiPageFault+0x260
    fffff880`0c246d00 fffff880`11008172 : fffffa80`09dce000 00000000`00000000 fffffa80`00000001 fffff880`0c247040 : dxgmms1!VidSchiProcessIsrCompletedPacket+0x46
    fffff880`0c246d90 fffff880`11007f76 : fffff880`00060238 fffffa80`08b17000 fffffa80`09dc4000 fffffa80`09a24000 : dxgmms1!VidSchDdiNotifyInterruptWorker+0x1ea
    fffff880`0c246de0 fffff880`11ce013f : fffffa80`08a89480 00000000`00000000 00000000`000003d0 00000000`00000000 : dxgmms1!VidSchDdiNotifyInterrupt+0x9e
    fffff880`0c246e10 fffff880`1113597e : fffff880`0c247040 fffff880`0c247040 00000000`00000000 fffffa80`08b17000 : dxgkrnl!DxgNotifyInterruptCB+0x83
    fffff880`0c246e40 fffff880`0c247040 : fffff880`0c247040 00000000`00000000 fffffa80`08b17000 fffff880`1113590e : nvlddmkm+0xb597e
    fffff880`0c246e48 fffff880`0c247040 : 00000000`00000000 fffffa80`08b17000 fffff880`1113590e fffffa80`08b17000 : 0xfffff880`0c247040
    fffff880`0c246e50 00000000`00000000 : fffffa80`08b17000 fffff880`1113590e fffffa80`08b17000 00000000`00000000 : 0xfffff880`0c247040
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    dxgmms1!VidSchiProcessIsrCompletedPacket+46
    fffff880`110084c6 837b5803        cmp     dword ptr [rbx+58h],3
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  dxgmms1!VidSchiProcessIsrCompletedPacket+46
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dxgmms1
    
    IMAGE_NAME:  dxgmms1.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce799c1
    
    FAILURE_BUCKET_ID:  X64_0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46
    
    BUCKET_ID:  X64_0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46
    
    Followup: MachineOwner
    ---------
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\040611-12464-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`03413000 PsLoadedModuleList = 0xfffff800`03658e90
    Debug session time: Wed Apr  6 01:59:06.980 2011 (UTC - 4:00)
    System Uptime: 0 days 0:32:17.556
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {58, 7, 0, fffff88011d984c6}
    
    Unable to load image nvlddmkm.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for nvlddmkm.sys
    *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
    Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiProcessIsrCompletedPacket+46 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000058, memory referenced
    Arg2: 0000000000000007, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88011d984c6, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036c40e8
     0000000000000058 
    
    CURRENT_IRQL:  7
    
    FAULTING_IP: 
    dxgmms1!VidSchiProcessIsrCompletedPacket+46
    fffff880`11d984c6 837b5803        cmp     dword ptr [rbx+58h],3
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  ustation.exe
    
    TRAP_FRAME:  fffff8800d4e3cd0 -- (.trap 0xfffff8800d4e3cd0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa8009d916a0 rbx=0000000000000000 rcx=0000000000000008
    rdx=fffffa8009d916a1 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88011d984c6 rsp=fffff8800d4e3e60 rbp=fffffa8009c09410
     r8=0000000000000001  r9=0000000000000000 r10=fffffa8009c09bd0
    r11=fffffa8009d916a0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    dxgmms1!VidSchiProcessIsrCompletedPacket+0x46:
    fffff880`11d984c6 837b5803        cmp     dword ptr [rbx+58h],3 ds:00000000`00000058=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003492be9 to fffff80003493640
    
    STACK_TEXT:  
    fffff880`0d4e3b88 fffff800`03492be9 : 00000000`0000000a 00000000`00000058 00000000`00000007 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0d4e3b90 fffff800`03491860 : fffff880`00000039 00000000`07fb0204 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`0d4e3cd0 fffff880`11d984c6 : fffffa80`09d91680 fffffa80`09c09410 fffffa80`09d90000 fffffa80`09d90000 : nt!KiPageFault+0x260
    fffff880`0d4e3e60 fffff880`11d98172 : fffffa80`09d90000 00000000`00000000 00000000`00000001 fffff880`0d4e41a0 : dxgmms1!VidSchiProcessIsrCompletedPacket+0x46
    fffff880`0d4e3ef0 fffff880`11d97f76 : fffffa80`000a60c7 00000000`00000001 fffffa80`09d86000 fffffa80`0999a000 : dxgmms1!VidSchDdiNotifyInterruptWorker+0x1ea
    fffff880`0d4e3f40 fffff880`11c9f13f : fffffa80`08c15480 00000000`00000000 00000000`000003d0 00000000`00000000 : dxgmms1!VidSchDdiNotifyInterrupt+0x9e
    fffff880`0d4e3f70 fffff880`110f497e : fffff880`0d4e41a0 fffff880`0d4e41a0 00000000`00000000 fffffa80`08cba000 : dxgkrnl!DxgNotifyInterruptCB+0x83
    fffff880`0d4e3fa0 fffff880`0d4e41a0 : fffff880`0d4e41a0 00000000`00000000 fffffa80`08cba000 fffff880`110f490e : nvlddmkm+0xb597e
    fffff880`0d4e3fa8 fffff880`0d4e41a0 : 00000000`00000000 fffffa80`08cba000 fffff880`110f490e fffffa80`08cba000 : 0xfffff880`0d4e41a0
    fffff880`0d4e3fb0 00000000`00000000 : fffffa80`08cba000 fffff880`110f490e fffffa80`08cba000 00000000`00000000 : 0xfffff880`0d4e41a0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    dxgmms1!VidSchiProcessIsrCompletedPacket+46
    fffff880`11d984c6 837b5803        cmp     dword ptr [rbx+58h],3
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  dxgmms1!VidSchiProcessIsrCompletedPacket+46
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dxgmms1
    
    IMAGE_NAME:  dxgmms1.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce799c1
    
    FAILURE_BUCKET_ID:  X64_0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46
    
    BUCKET_ID:  X64_0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46
    
    Followup: MachineOwner
    ---------
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\040611-12729-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`03419000 PsLoadedModuleList = 0xfffff800`0365ee90
    Debug session time: Wed Apr  6 03:41:37.283 2011 (UTC - 4:00)
    System Uptime: 0 days 0:47:23.860
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {58, 5, 0, fffff88011d7c4c6}
    
    Unable to load image nvlddmkm.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for nvlddmkm.sys
    *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
    Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiProcessIsrCompletedPacket+46 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000058, memory referenced
    Arg2: 0000000000000005, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88011d7c4c6, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036ca0e8
     0000000000000058 
    
    CURRENT_IRQL:  5
    
    FAULTING_IP: 
    dxgmms1!VidSchiProcessIsrCompletedPacket+46
    fffff880`11d7c4c6 837b5803        cmp     dword ptr [rbx+58h],3
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  ustation.exe
    
    TRAP_FRAME:  fffff8800acfd210 -- (.trap 0xfffff8800acfd210)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa8009d26430 rbx=0000000000000000 rcx=0000000000000009
    rdx=fffffa8009d26431 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88011d7c4c6 rsp=fffff8800acfd3a0 rbp=fffffa8009c4b410
     r8=0000000000000001  r9=0000000000000000 r10=fffffa8009c4bbd0
    r11=fffffa8009d26500 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    dxgmms1!VidSchiProcessIsrCompletedPacket+0x46:
    fffff880`11d7c4c6 837b5803        cmp     dword ptr [rbx+58h],3 ds:00000000`00000058=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003498be9 to fffff80003499640
    
    STACK_TEXT:  
    fffff880`0acfd0c8 fffff800`03498be9 : 00000000`0000000a 00000000`00000058 00000000`00000005 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0acfd0d0 fffff800`03497860 : 00000000`00000000 00000000`00000000 00000000`00000003 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`0acfd210 fffff880`11d7c4c6 : fffffa80`09d264e0 fffffa80`09c4b410 fffffa80`09d25000 fffffa80`09d25000 : nt!KiPageFault+0x260
    fffff880`0acfd3a0 fffff880`11d7c172 : fffffa80`09d25000 00000000`00000000 fffffa80`00000001 fffff880`0acfd6e0 : dxgmms1!VidSchiProcessIsrCompletedPacket+0x46
    fffff880`0acfd430 fffff880`11d7bf76 : fffff880`0012f017 fffffa80`08c86000 fffffa80`09d1b000 fffffa80`09a12000 : dxgmms1!VidSchDdiNotifyInterruptWorker+0x1ea
    fffff880`0acfd480 fffff880`11c8313f : fffffa80`08ae33f0 00000000`00000000 00000000`000003d0 00000000`00000000 : dxgmms1!VidSchDdiNotifyInterrupt+0x9e
    fffff880`0acfd4b0 fffff880`110d897e : fffff880`0acfd6e0 fffff880`0acfd6e0 00000000`00000000 fffffa80`08c86000 : dxgkrnl!DxgNotifyInterruptCB+0x83
    fffff880`0acfd4e0 fffff880`0acfd6e0 : fffff880`0acfd6e0 00000000`00000000 fffffa80`08c86000 fffff880`110d890e : nvlddmkm+0xb597e
    fffff880`0acfd4e8 fffff880`0acfd6e0 : 00000000`00000000 fffffa80`08c86000 fffff880`110d890e fffffa80`08c86000 : 0xfffff880`0acfd6e0
    fffff880`0acfd4f0 00000000`00000000 : fffffa80`08c86000 fffff880`110d890e fffffa80`08c86000 00000000`00000000 : 0xfffff880`0acfd6e0
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    dxgmms1!VidSchiProcessIsrCompletedPacket+46
    fffff880`11d7c4c6 837b5803        cmp     dword ptr [rbx+58h],3
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  dxgmms1!VidSchiProcessIsrCompletedPacket+46
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dxgmms1
    
    IMAGE_NAME:  dxgmms1.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce799c1
    
    FAILURE_BUCKET_ID:  X64_0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46
    
    BUCKET_ID:  X64_0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46
    
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR:
    fffff880`11da6050 4c8bdc          mov     r11,rsp
    fffff880`11da6053 49895b10        mov     qword ptr [r11+10h],rbx
    fffff880`11da6057 49896b18        mov     qword ptr [r11+18h],rbp
    fffff880`11da605b 49897320        mov     qword ptr [r11+20h],rsi
    fffff880`11da605f 57              push    rdi
    fffff880`11da6060 4154            push    r12
    fffff880`11da6062 4155            push    r13
    fffff880`11da6064 4883ec20        sub     rsp,20h
    fffff880`11da6068 488b39          mov     rdi,qword ptr [rcx]
    fffff880`11da606b 4533ed          xor     r13d,r13d
    fffff880`11da606e 488be9          mov     rbp,rcx
    fffff880`11da6071 488b5f50        mov     rbx,qword ptr [rdi+50h]
    fffff880`11da6075 33c0            xor     eax,eax
    fffff880`11da6077 4c8b6310        mov     r12,qword ptr [rbx+10h]
    fffff880`11da607b f0440fb1af90010000 lock cmpxchg dword ptr [rdi+190h],r13d
    fffff880`11da6084 83f801          cmp     eax,1
    fffff880`11da6087 498d4b08        lea     rcx,[r11+8]
    fffff880`11da608b 400f94c6        sete    sil
    fffff880`11da608f ff156b4f0000    call    qword ptr [dxgmms1!_imp_KeQueryPerformanceCounter (fffff880`11dab000)]
    fffff880`11da6095 33d2            xor     edx,edx
    fffff880`11da6097 4c8bd8          mov     r11,rax
    fffff880`11da609a 482b87a8010000  sub     rax,qword ptr [rdi+1A8h]
    fffff880`11da60a1 4869c080969800  imul    rax,rax,989680h
    fffff880`11da60a8 48f7742440      div     rax,qword ptr [rsp+40h]
    fffff880`11da60ad 480187a0010000  add     qword ptr [rdi+1A0h],rax
    fffff880`11da60b4 48018358090000  add     qword ptr [rbx+958h],rax
    fffff880`11da60bb 488b5750        mov     rdx,qword ptr [rdi+50h]
    fffff880`11da60bf 488b4a10        mov     rcx,qword ptr [rdx+10h]
    fffff880`11da60c3 8b5204          mov     edx,dword ptr [rdx+4]
    fffff880`11da60c6 448b4104        mov     r8d,dword ptr [rcx+4]
    fffff880`11da60ca 488b4f58        mov     rcx,qword ptr [rdi+58h]
    fffff880`11da60ce 488b4928        mov     rcx,qword ptr [rcx+28h]
    fffff880`11da60d2 4a8b4cc118      mov     rcx,qword ptr [rcx+r8*8+18h]
    fffff880`11da60d7 488b54d108      mov     rdx,qword ptr [rcx+rdx*8+8]
    fffff880`11da60dc 480102          add     qword ptr [rdx],rax
    fffff880`11da60df 4c899fa8010000  mov     qword ptr [rdi+1A8h],r11
    fffff880`11da60e6 413af5          cmp     sil,r13b
    fffff880`11da60e9 750b            jne     dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xa6 (fffff880`11da60f6)
    
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0x9b:
    fffff880`11da60eb 41f684247808000008 test  byte ptr [r12+878h],8
    fffff880`11da60f4 7428            je      dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xce (fffff880`11da611e)
    
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xa6:
    fffff880`11da60f6 48298798010000  sub     qword ptr [rdi+198h],rax
    fffff880`11da60fd 413af5          cmp     sil,r13b
    fffff880`11da6100 741c            je      dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xce (fffff880`11da611e)
    
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xb2:
    fffff880`11da6102 4c39af98010000  cmp     qword ptr [rdi+198h],r13
    fffff880`11da6109 7f13            jg      dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xce (fffff880`11da611e)
    
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xbb:
    fffff880`11da610b b902000000      mov     ecx,2
    fffff880`11da6110 8d41ff          lea     eax,[rcx-1]
    fffff880`11da6113 f00fb18f90010000 lock cmpxchg dword ptr [rdi+190h],ecx
    fffff880`11da611b 418af5          mov     sil,r13b
    
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xce:
    fffff880`11da611e 488b05934f0000  mov     rax,qword ptr [dxgmms1!_imp_g_loggerInfo (fffff880`11dab0b8)]
    fffff880`11da6125 44396808        cmp     dword ptr [rax+8],r13d
    fffff880`11da6129 7425            je      dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0x100 (fffff880`11da6150)
    
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xdb:
    fffff880`11da612b 488b4f28        mov     rcx,qword ptr [rdi+28h]
    fffff880`11da612f 448b8f90010000  mov     r9d,dword ptr [rdi+190h]
    fffff880`11da6136 4c8b8798010000  mov     r8,qword ptr [rdi+198h]
    fffff880`11da613d 488b97a0010000  mov     rdx,qword ptr [rdi+1A0h]
    fffff880`11da6144 493bcd          cmp     rcx,r13
    fffff880`11da6147 480f44cf        cmove   rcx,rdi
    fffff880`11da614b e88477ffff      call    dxgmms1!TraceDxgkUpdateContextRunningTime (fffff880`11d9d8d4)
    
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0x100:
    fffff880`11da6150 488b8f98010000  mov     rcx,qword ptr [rdi+198h]
    fffff880`11da6157 488b5c2448      mov     rbx,qword ptr [rsp+48h]
    fffff880`11da615c 408ac6          mov     al,sil
    fffff880`11da615f 488b742458      mov     rsi,qword ptr [rsp+58h]
    fffff880`11da6164 48894d10        mov     qword ptr [rbp+10h],rcx
    fffff880`11da6168 488b8fa0010000  mov     rcx,qword ptr [rdi+1A0h]
    fffff880`11da616f 48894d08        mov     qword ptr [rbp+8],rcx
    fffff880`11da6173 488b6c2450      mov     rbp,qword ptr [rsp+50h]
    fffff880`11da6178 4883c420        add     rsp,20h
    fffff880`11da617c 415d            pop     r13
    fffff880`11da617e 415c            pop     r12
    fffff880`11da6180 5f              pop     rdi
    fffff880`11da6181 c3              ret
    
    Followup: MachineOwner
    ---------
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\DMP\042011-14398-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`03409000 PsLoadedModuleList = 0xfffff800`0364ee90
    Debug session time: Wed Apr 20 04:03:24.922 2011 (UTC - 4:00)
    System Uptime: 0 days 2:35:32.124
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {50, 5, 0, fffff88011da6071}
    
    Unable to load image nvlddmkm.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for nvlddmkm.sys
    *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
    Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiUpdateContextRunningTimeAtISR+21 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000050, memory referenced
    Arg2: 0000000000000005, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88011da6071, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036ba0e8
     0000000000000050 
    
    CURRENT_IRQL:  5
    
    FAULTING_IP: 
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR+21
    fffff880`11da6071 488b5f50        mov     rbx,qword ptr [rdi+50h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  ustation.exe
    
    TRAP_FRAME:  fffff88003db2650 -- (.trap 0xfffff88003db2650)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffff88003db2860
    rdx=00000000003bd35e rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88011da6071 rsp=fffff88003db27e0 rbp=fffff88003db2860
     r8=0000000000000001  r9=0000000000000000 r10=fffffa8000000000
    r11=fffff88003db2818 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0x21:
    fffff880`11da6071 488b5f50        mov     rbx,qword ptr [rdi+50h] ds:00000000`00000050=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80003488be9 to fffff80003489640
    
    STACK_TEXT:  
    fffff880`03db2508 fffff800`03488be9 : 00000000`0000000a 00000000`00000050 00000000`00000005 00000000`00000000 : nt!KeBugCheckEx
    fffff880`03db2510 fffff800`03487860 : fffffa80`0a46b010 00000000`00000000 00000000`00000000 fffffa80`09d675b0 : nt!KiBugCheckDispatch+0x69
    fffff880`03db2650 fffff880`11da6071 : 00000000`00000000 fffffa80`09d66000 00000000`00000000 00000000`0000000c : nt!KiPageFault+0x260
    fffff880`03db27e0 fffff880`11da25af : fffffa80`09d67410 fffffa80`09d675b0 fffffa80`09d20410 fffffa80`09d66000 : dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0x21
    fffff880`03db2820 fffff880`11da2172 : fffffa80`09d66000 00000000`00000000 fffffa80`00000001 fffff880`03db2b60 : dxgmms1!VidSchiProcessIsrCompletedPacket+0x12f
    fffff880`03db28b0 fffff880`11da1f76 : fffff880`003bd35e fffffa80`08d65000 fffffa80`09d5c000 fffffa80`09afb000 : dxgmms1!VidSchDdiNotifyInterruptWorker+0x1ea
    fffff880`03db2900 fffff880`11ca913f : fffffa80`08aa32f0 00000000`00000000 00000000`000003d0 00000000`00000000 : dxgmms1!VidSchDdiNotifyInterrupt+0x9e
    fffff880`03db2930 fffff880`110fe97e : fffff880`03db2b60 fffff880`03db2b60 00000000`00000000 fffffa80`08d65000 : dxgkrnl!DxgNotifyInterruptCB+0x83
    fffff880`03db2960 fffff880`03db2b60 : fffff880`03db2b60 00000000`00000000 fffffa80`08d65000 fffff880`110fe90e : nvlddmkm+0xb597e
    fffff880`03db2968 fffff880`03db2b60 : 00000000`00000000 fffffa80`08d65000 fffff880`110fe90e fffffa80`08d65000 : 0xfffff880`03db2b60
    fffff880`03db2970 00000000`00000000 : fffffa80`08d65000 fffff880`110fe90e fffffa80`08d65000 00000000`00000000 : 0xfffff880`03db2b60
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR+21
    fffff880`11da6071 488b5f50        mov     rbx,qword ptr [rdi+50h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  dxgmms1!VidSchiUpdateContextRunningTimeAtISR+21
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dxgmms1
    
    IMAGE_NAME:  dxgmms1.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce799c1
    
    FAILURE_BUCKET_ID:  X64_0xD1_dxgmms1!VidSchiUpdateContextRunningTimeAtISR+21
    
    BUCKET_ID:  X64_0xD1_dxgmms1!VidSchiUpdateContextRunningTimeAtISR+21
    
    Followup: MachineOwner
    ---------
    
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR:
    fffff880`11da6050 4c8bdc          mov     r11,rsp
    fffff880`11da6053 49895b10        mov     qword ptr [r11+10h],rbx
    fffff880`11da6057 49896b18        mov     qword ptr [r11+18h],rbp
    fffff880`11da605b 49897320        mov     qword ptr [r11+20h],rsi
    fffff880`11da605f 57              push    rdi
    fffff880`11da6060 4154            push    r12
    fffff880`11da6062 4155            push    r13
    fffff880`11da6064 4883ec20        sub     rsp,20h
    fffff880`11da6068 488b39          mov     rdi,qword ptr [rcx]
    fffff880`11da606b 4533ed          xor     r13d,r13d
    fffff880`11da606e 488be9          mov     rbp,rcx
    fffff880`11da6071 488b5f50        mov     rbx,qword ptr [rdi+50h]
    fffff880`11da6075 33c0            xor     eax,eax
    fffff880`11da6077 4c8b6310        mov     r12,qword ptr [rbx+10h]
    fffff880`11da607b f0440fb1af90010000 lock cmpxchg dword ptr [rdi+190h],r13d
    fffff880`11da6084 83f801          cmp     eax,1
    fffff880`11da6087 498d4b08        lea     rcx,[r11+8]
    fffff880`11da608b 400f94c6        sete    sil
    fffff880`11da608f ff156b4f0000    call    qword ptr [dxgmms1!_imp_KeQueryPerformanceCounter (fffff880`11dab000)]
    fffff880`11da6095 33d2            xor     edx,edx
    fffff880`11da6097 4c8bd8          mov     r11,rax
    fffff880`11da609a 482b87a8010000  sub     rax,qword ptr [rdi+1A8h]
    fffff880`11da60a1 4869c080969800  imul    rax,rax,989680h
    fffff880`11da60a8 48f7742440      div     rax,qword ptr [rsp+40h]
    fffff880`11da60ad 480187a0010000  add     qword ptr [rdi+1A0h],rax
    fffff880`11da60b4 48018358090000  add     qword ptr [rbx+958h],rax
    fffff880`11da60bb 488b5750        mov     rdx,qword ptr [rdi+50h]
    fffff880`11da60bf 488b4a10        mov     rcx,qword ptr [rdx+10h]
    fffff880`11da60c3 8b5204          mov     edx,dword ptr [rdx+4]
    fffff880`11da60c6 448b4104        mov     r8d,dword ptr [rcx+4]
    fffff880`11da60ca 488b4f58        mov     rcx,qword ptr [rdi+58h]
    fffff880`11da60ce 488b4928        mov     rcx,qword ptr [rcx+28h]
    fffff880`11da60d2 4a8b4cc118      mov     rcx,qword ptr [rcx+r8*8+18h]
    fffff880`11da60d7 488b54d108      mov     rdx,qword ptr [rcx+rdx*8+8]
    fffff880`11da60dc 480102          add     qword ptr [rdx],rax
    fffff880`11da60df 4c899fa8010000  mov     qword ptr [rdi+1A8h],r11
    fffff880`11da60e6 413af5          cmp     sil,r13b
    fffff880`11da60e9 750b            jne     dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xa6 (fffff880`11da60f6)
    
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0x9b:
    fffff880`11da60eb 41f684247808000008 test  byte ptr [r12+878h],8
    fffff880`11da60f4 7428            je      dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xce (fffff880`11da611e)
    
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xa6:
    fffff880`11da60f6 48298798010000  sub     qword ptr [rdi+198h],rax
    fffff880`11da60fd 413af5          cmp     sil,r13b
    fffff880`11da6100 741c            je      dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xce (fffff880`11da611e)
    
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xb2:
    fffff880`11da6102 4c39af98010000  cmp     qword ptr [rdi+198h],r13
    fffff880`11da6109 7f13            jg      dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xce (fffff880`11da611e)
    
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xbb:
    fffff880`11da610b b902000000      mov     ecx,2
    fffff880`11da6110 8d41ff          lea     eax,[rcx-1]
    fffff880`11da6113 f00fb18f90010000 lock cmpxchg dword ptr [rdi+190h],ecx
    fffff880`11da611b 418af5          mov     sil,r13b
    
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xce:
    fffff880`11da611e 488b05934f0000  mov     rax,qword ptr [dxgmms1!_imp_g_loggerInfo (fffff880`11dab0b8)]
    fffff880`11da6125 44396808        cmp     dword ptr [rax+8],r13d
    fffff880`11da6129 7425            je      dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0x100 (fffff880`11da6150)
    
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xdb:
    fffff880`11da612b 488b4f28        mov     rcx,qword ptr [rdi+28h]
    fffff880`11da612f 448b8f90010000  mov     r9d,dword ptr [rdi+190h]
    fffff880`11da6136 4c8b8798010000  mov     r8,qword ptr [rdi+198h]
    fffff880`11da613d 488b97a0010000  mov     rdx,qword ptr [rdi+1A0h]
    fffff880`11da6144 493bcd          cmp     rcx,r13
    fffff880`11da6147 480f44cf        cmove   rcx,rdi
    fffff880`11da614b e88477ffff      call    dxgmms1!TraceDxgkUpdateContextRunningTime (fffff880`11d9d8d4)
    
    dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0x100:
    fffff880`11da6150 488b8f98010000  mov     rcx,qword ptr [rdi+198h]
    fffff880`11da6157 488b5c2448      mov     rbx,qword ptr [rsp+48h]
    fffff880`11da615c 408ac6          mov     al,sil
    fffff880`11da615f 488b742458      mov     rsi,qword ptr [rsp+58h]
    fffff880`11da6164 48894d10        mov     qword ptr [rbp+10h],rcx
    fffff880`11da6168 488b8fa0010000  mov     rcx,qword ptr [rdi+1A0h]
    fffff880`11da616f 48894d08        mov     qword ptr [rbp+8],rcx
    fffff880`11da6173 488b6c2450      mov     rbp,qword ptr [rsp+50h]
    fffff880`11da6178 4883c420        add     rsp,20h
    fffff880`11da617c 415d            pop     r13
    fffff880`11da617e 415c            pop     r12
    fffff880`11da6180 5f              pop     rdi
    fffff880`11da6181 c3              ret
    
    
    
    




    DRIVERS

    Code:
    start             end                 module name
    fffff880`00ed1000 fffff880`00f28000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
    fffff880`04a9a000 fffff880`04b23000   afd      afd.sys      Sat Nov 20 04:23:27 2010 (4CE7938F)
    fffff880`04c66000 fffff880`04c7c000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`01691000 fffff880`016e7000   ahcix64s ahcix64s.sys Wed Mar 17 05:50:58 2010 (4BA0A602)
    fffff880`06f4b000 fffff880`06f4e680   AKSCLASS AKSCLASS.SYS Mon Apr 18 08:58:03 2005 (4263AEDB)
    fffff880`0809e000 fffff880`080ade00   aksdf    aksdf.sys    Wed Dec 13 12:09:32 2006 (458033CC)
    fffff880`06f4f000 fffff880`06f65080   akshasp  akshasp.sys  Thu Nov 16 11:12:04 2006 (455C8DD4)
    fffff880`06f46000 fffff880`06f4a900   aksusb   aksusb.sys   Thu Nov 16 10:37:01 2006 (455C859D)
    fffff880`04d66000 fffff880`04d7b000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00ec6000 fffff880`00ed1000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
    fffff880`089f4000 fffff880`089ff000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
    fffff880`01689000 fffff880`01691000   AtiPcie64 AtiPcie64.sys Wed Mar 10 09:33:45 2010 (4B97ADC9)
    fffff880`019f8000 fffff880`019ff000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`04d2f000 fffff880`04d40000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`081b6000 fffff880`081d4000   bowser   bowser.sys   Tue Feb 22 23:55:04 2011 (4D649328)
    fffff960`00670000 fffff960`00697000   cdd      cdd.dll      Sat Nov 20 07:55:34 2010 (4CE7C546)
    fffff880`01200000 fffff880`0122a000   cdrom    cdrom.sys    Sat Nov 20 04:19:20 2010 (4CE79298)
    fffff880`00d40000 fffff880`00e00000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
    fffff880`01659000 fffff880`01689000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
    fffff880`00ce2000 fffff880`00d40000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01302000 fffff880`01374000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
    fffff880`04c56000 fffff880`04c66000   CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
    fffff880`06e88000 fffff880`06e96000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`04c8e000 fffff880`04d11000   csc      csc.sys      Sat Nov 20 04:27:12 2010 (4CE79470)
    fffff880`04dd1000 fffff880`04dfa000   deva001  deva001.sys  Tue Oct 05 05:29:01 2010 (4CAAEFDD)
    fffff880`04d11000 fffff880`04d2f000   dfsc     dfsc.sys     Sat Nov 20 04:26:31 2010 (4CE79447)
    fffff880`04beb000 fffff880`04bfa000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01643000 fffff880`01659000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`06ae1000 fffff880`06b03000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`06ea0000 fffff880`06ef6000   dump_ahcix64s dump_ahcix64s.sys Wed Mar 17 05:50:58 2010 (4BA0A602)
    fffff880`06ef6000 fffff880`06f09000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`06e96000 fffff880`06ea0000   dump_storport dump_storport.sys Sat Nov 20 05:33:56 2010 (4CE7A414)
    fffff880`06e7c000 fffff880`06e88000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`11ca6000 fffff880`11d9a000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 04:50:50 2010 (4CE799FA)
    fffff880`11d9a000 fffff880`11de0000   dxgmms1  dxgmms1.sys  Sat Nov 20 04:49:53 2010 (4CE799C1)
    fffff880`080ae000 fffff880`080e4000   fastfat  fastfat.SYS  Mon Jul 13 19:23:28 2009 (4A5BC1F0)
    fffff880`0100e000 fffff880`01022000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`00fa5000 fffff880`00ff1000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
    fffff880`01385000 fffff880`0138f000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01609000 fffff880`01643000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
    fffff880`018fe000 fffff880`01948000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
    fffff800`039f3000 fffff800`03a3c000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
    fffff880`06a00000 fffff880`06a4cc00   hardlock hardlock.sys Thu Nov 30 12:12:07 2006 (456F10E7)
    fffff880`11000000 fffff880`11024000   HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
    fffff880`06f17000 fffff880`06f30000   HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`06f30000 fffff880`06f38080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`06f09000 fffff880`06f17000   hidusb   hidusb.sys   Sat Nov 20 05:43:49 2010 (4CE7A665)
    fffff880`080ed000 fffff880`081b6000   HTTP     HTTP.sys     Sat Nov 20 04:24:30 2010 (4CE793CE)
    fffff880`01600000 fffff880`01609000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
    fffff880`04f0b000 fffff880`04f1a000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`06fac000 fffff880`06fba000   kbdhid   kbdhid.sys   Sat Nov 20 05:33:25 2010 (4CE7A3F5)
    fffff800`00bd2000 fffff800`00bdc000   kdcom    kdcom.dll    Sat Feb 05 11:52:49 2011 (4D4D8061)
    fffff880`04f2b000 fffff880`04f6e000   ks       ks.sys       Sat Nov 20 05:33:23 2010 (4CE7A3F3)
    fffff880`012e7000 fffff880`01302000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
    fffff880`0155c000 fffff880`01587000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
    fffff880`06b03000 fffff880`06b08200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`06c00000 fffff880`06c15000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`06fba000 fffff880`06fdd000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00cc1000 fffff880`00cce000   mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`06f66000 fffff880`06f74000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`04f1a000 fffff880`04f29000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`06f39000 fffff880`06f46000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00e5c000 fffff880`00e76000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
    fffff880`081d4000 fffff880`081ec000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`08000000 fffff880`0802d000   mrxsmb   mrxsmb.sys   Tue Feb 22 23:56:22 2011 (4D649376)
    fffff880`0802d000 fffff880`0807a000   mrxsmb10 mrxsmb10.sys Tue Feb 22 23:55:12 2011 (4D649330)
    fffff880`0807a000 fffff880`0809e000   mrxsmb20 mrxsmb20.sys Tue Feb 22 23:55:12 2011 (4D649330)
    fffff880`011c5000 fffff880`011d0000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f31000 fffff880`00f3b000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01289000 fffff880`012e7000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
    fffff880`04a5d000 fffff880`04a68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`019e6000 fffff880`019f8000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01409000 fffff880`014fc000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
    fffff880`04e6f000 fffff880`04e7b000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`06c15000 fffff880`06c28000   ndisuio  ndisuio.sys  Sat Nov 20 05:50:08 2010 (4CE7A7E0)
    fffff880`04e7b000 fffff880`04eaa000   ndiswan  ndiswan.sys  Sat Nov 20 05:52:32 2010 (4CE7A870)
    fffff880`04fda000 fffff880`04fef000   NDProxy  NDProxy.SYS  Sat Nov 20 05:52:20 2010 (4CE7A864)
    fffff880`04bad000 fffff880`04bbc000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`04b23000 fffff880`04b68000   netbt    netbt.sys    Sat Nov 20 04:23:18 2010 (4CE79386)
    fffff880`014fc000 fffff880`0155c000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
    fffff880`011d0000 fffff880`011e1000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`04a51000 fffff880`04a5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`03409000 fffff800`039f3000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
    fffff880`01022000 fffff880`011c5000   Ntfs     Ntfs.sys     Sat Nov 20 04:20:57 2010 (4CE792F9)
    fffff880`015f4000 fffff880`015fd000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`11ca4000 fffff880`11ca5180   nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
    fffff880`04e00000 fffff880`04e29000   nvhda64v nvhda64v.sys Thu Nov 11 18:10:36 2010 (4CDC77EC)
    fffff880`11049000 fffff880`11ca3d00   nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
    fffff880`06b09000 fffff880`06b5c000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`04b71000 fffff880`04b97000   pacer    pacer.sys    Sat Nov 20 05:52:18 2010 (4CE7A862)
    fffff880`00f7b000 fffff880`00f90000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
    fffff880`00f3b000 fffff880`00f6e000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
    fffff880`01374000 fffff880`01385000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`08436000 fffff880`084dc000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`06aa4000 fffff880`06ae1000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00cce000 fffff880`00ce2000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`04e4b000 fffff880`04e6f000   rasl2tp  rasl2tp.sys  Sat Nov 20 05:52:34 2010 (4CE7A872)
    fffff880`04eaa000 fffff880`04ec5000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`04ec5000 fffff880`04ee6000   raspptp  raspptp.sys  Sat Nov 20 05:52:31 2010 (4CE7A86F)
    fffff880`04ee6000 fffff880`04f00000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`04a00000 fffff880`04a51000   rdbss    rdbss.sys    Sat Nov 20 04:27:51 2010 (4CE79497)
    fffff880`04f00000 fffff880`04f0b000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`01400000 fffff880`01409000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0126d000 fffff880`01276000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01276000 fffff880`0127f000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`019ac000 fffff880`019e6000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
    fffff880`06b5c000 fffff880`06b74000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`04c00000 fffff880`04c56000   Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95)
    fffff880`06c3d000 fffff880`06e7b580   RTKVHD64 RTKVHD64.sys Fri Apr 30 05:05:58 2010 (4BDA9D76)
    fffff880`084dc000 fffff880`084e7000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`019a4000 fffff880`019ac000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`088eb000 fffff880`08983000   srv      srv.sys      Tue Feb 22 23:56:21 2011 (4D649375)
    fffff880`0852a000 fffff880`08594000   srv2     srv2.sys     Tue Feb 22 23:56:00 2011 (4D649360)
    fffff880`084e7000 fffff880`08518000   srvnet   srvnet.sys   Tue Feb 22 23:55:44 2011 (4D649350)
    fffff880`01587000 fffff880`015ea000   storport storport.sys Sat Nov 20 05:35:02 2010 (4CE7A456)
    fffff880`04f29000 fffff880`04f2a480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`016fa000 fffff880`018fe000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
    fffff880`08518000 fffff880`0852a000   tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
    fffff880`04a8d000 fffff880`04a9a000   TDI      TDI.SYS      Sat Nov 20 04:22:06 2010 (4CE7933E)
    fffff880`04a6b000 fffff880`04a8d000   tdx      tdx.sys      Sat Nov 20 04:21:54 2010 (4CE79332)
    fffff880`04bd7000 fffff880`04beb000   termdd   termdd.sys   Sat Nov 20 06:03:40 2010 (4CE7AB0C)
    fffff960`00570000 fffff960`0057a000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`04d40000 fffff880`04d66000   tunnel   tunnel.sys   Sat Nov 20 05:51:50 2010 (4CE7A846)
    fffff880`04f6e000 fffff880`04f80000   umbus    umbus.sys    Sat Nov 20 05:44:37 2010 (4CE7A695)
    fffff880`06f8f000 fffff880`06fac000   usbccgp  usbccgp.sys  Sat Nov 20 05:44:03 2010 (4CE7A673)
    fffff880`11df1000 fffff880`11df2f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`11de0000 fffff880`11df1000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`1102f000 fffff880`1103c000   usbfilter usbfilter.sys Tue Dec 22 03:26:22 2009 (4B3082AE)
    fffff880`04f80000 fffff880`04fda000   usbhub   usbhub.sys   Sat Nov 20 05:44:30 2010 (4CE7A68E)
    fffff880`11024000 fffff880`1102f000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04d7b000 fffff880`04dd1000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`06f74000 fffff880`06f8f000   USBSTOR  USBSTOR.SYS  Sat Nov 20 05:44:05 2010 (4CE7A675)
    fffff880`00f6e000 fffff880`00f7b000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`0122a000 fffff880`01238000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`01238000 fffff880`0125d000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00e76000 fffff880`00eb2000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
    fffff880`01948000 fffff880`01958000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
    fffff880`11df3000 fffff880`11dfa000   vncmirror vncmirror.sys Fri Mar 14 13:43:05 2008 (47DAB929)
    fffff880`00f90000 fffff880`00fa5000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
    fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
    fffff880`01958000 fffff880`019a4000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
    fffff880`04b97000 fffff880`04bad000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`04bbc000 fffff880`04bd7000   wanarp   wanarp.sys   Sat Nov 20 05:52:36 2010 (4CE7A874)
    fffff880`0125d000 fffff880`0126d000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00c00000 fffff880`00ca4000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00ca4000 fffff880`00cb3000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`04b68000 fffff880`04b71000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00050000 fffff960`00362000   win32k   win32k.sys   Wed Mar 02 22:51:40 2011 (4D6F104C)
    fffff880`00eb2000 fffff880`00ec6000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
    fffff880`00f28000 fffff880`00f31000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`06fdd000 fffff880`06ffe000   WudfPf   WudfPf.sys   Sat Nov 20 05:42:44 2010 (4CE7A624)
    
    Unloaded modules:
    fffff880`08983000 fffff880`089f4000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00071000
    fffff880`06b74000 fffff880`06bc4000   deva004.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00050000
    fffff880`016e7000 fffff880`016f5000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`015ea000 fffff880`015f4000   dump_storpor
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000A000
    fffff880`0138f000 fffff880`013e5000   dump_ahcix64
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00056000
    fffff880`013e5000 fffff880`013f8000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
     

Share This Page

Loading...